Dvwa Report
Dvwa Report
Dvwa Report
ABHIRAM T
CONTENTS
1
1. Installation of DVWA using Docker
To install Damn Vulnerable Web Application (DVWA), I used Docker for a streamlined
setup. Below are the steps I followed to complete the installation:
Screenshot 1
2
1.4 Logging In
At the login page, I used the default credentials:
- Username: admin
- Password: password
Screenshot 3
1.5 Resetting the Database
After logging in for the first time, I was prompted to reset the database. I clicked the "Reset
Database" button (I missed capturing a screenshot of this step). Once the reset was
completed, the system redirected me back to the login page.
1.6 Logging In Again
After resetting the database, I logged in again with the default credentials to access the
DVWA dashboard.
1.7 Completion
At this point, the DVWA setup was complete, and the environment was ready for
vulnerability testing.
3
2. Performing SQL Injection on DVWA
2.1 SQL Injection (Low Security Level)
I began by testing SQL injection on the Low security level.
2.1.1 Initial Injection
After accessing the SQL injection page, I quickly identified the input field for injecting SQL
code.
2.1.2 SQL Payload
I used the following basic SQL injection string:
1' OR '1'='1
Screenshot 4
This payload bypassed the need for valid input and displayed the first name and surname of
all users.
Screenshot 5
4
2.2 SQL Injection (Medium Security Level)
Next, I changed the DVWA security setting to Medium and conducted the test with an
enhanced payload.
2.2.1 Using Burp Suite
I used Burp Suite to intercept the HTTP request. I modified the `id` parameter in the request
to insert a more advanced SQL injection string.
Screenshot 6 Screenshot 7
2.2.2 SQL Injection String
I inserted the following payload into the `id` field:
1 UNION SELECT user, password FROM users - -
Screenshot 6
5
2.2.3 Execution
After editing the request in Burp Suite, I sent it to the server. As a result, I was able to retrieve
usernames and passwords from the system’s response (refer screenshot 6 and screenshot 7).
Screenshot 7
Screenshot 8
6
a new window appeared where I could input SQL command.
Screenshot 9
2.3.2 Injection Payload
I inserted the following SQL injection string:
' UNION SELECT user, password FROM users - -
Screenshot 10
7
2.3.3 Results
After submitting the malicious code, the system returned a list of usernames and passwords,
successfully confirming the vulnerability even at the highest security setting.
Screenshot 11
8
Conclusion
I successfully installed DVWA using Docker and tested SQL injection vulnerabilities at
different security levels. Using simple and advanced SQL injection payloads, along with Burp
Suite for request interception, I was able to extract sensitive information from the database
across all security settings, demonstrating the effectiveness of these attacks.